Skip to main content

Research Repository

Advanced Search

Intelligence techniques in computer security and forensics: At the boundaries of ethics and law

Stahl, Bernd; Carroll-Mayer, Moira; Elizondo, David; Wakunuma, Kutoma; Zheng, Yingqin

Authors

Moira Carroll-Mayer

David Elizondo

Kutoma Wakunuma

Yingqin Zheng



Contributors

David A. Elizondo
Editor

Agusti Solanas
Editor

Antoni Martinez-Balleste
Editor

Abstract

Computational Intelligence (CI) techniques have been widely used in the domains of computer security and computer forensics. One problem that normative discussions of technologies face is that the technical capabilities under investigation tend to be unclear and that the experts in normative questions do not tend to be experts in technical developments and vice versa. The present paper therefore sets out to chart the ethical and legal problems arising from a new and fast moving field, namely that of computational intelligence and its application to computer security and forensics. Using artificial neural networks (ANNs) as an example of computational intelligence, the paper’s main aim is to create a link between what can now be perceived as technical developments and established discourses in ethics and the law. It aims to chart the territory to highlight likely ethical and legal problems related to ANNs and point in the direction of future research.

Citation

Stahl, B., Carroll-Mayer, M., Elizondo, D., Wakunuma, K., & Zheng, Y. (2012). Intelligence techniques in computer security and forensics: At the boundaries of ethics and law. In D. A. Elizondo, A. Solanas, & A. Martinez-Balleste (Eds.), Computational Intelligence for Privacy and Security. Springer. https://doi.org/10.1007/978-3-642-25237-2_14

Publication Date 2012
Deposit Date Jul 29, 2023
Series Title Studies in Computational Intelligence
Series Number 394
Series ISSN 1860-949X
Book Title Computational Intelligence for Privacy and Security
ISBN 9783642252365
DOI https://doi.org/10.1007/978-3-642-25237-2_14
Public URL https://nottingham-repository.worktribe.com/output/23505919
Publisher URL https://link.springer.com/chapter/10.1007/978-3-642-25237-2_14